Categories: Cyber Security News

Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident

Let’s Encrypt temporarily suspended all certificate issuance on May 8, 2026, after engineers identified a critical issue involving a cross-signed certificate linking the organization’s Generation X root to its upcoming Generation Y root infrastructure.

The incident triggered a complete shutdown of issuance across both production and staging environments before services were restored within hours.

At 18:37 UTC on May 8, Let’s Encrypt engineers became aware of a potential incident and immediately halted all certificate issuance as a precautionary measure.

The affected components included the production and staging ACME API endpoints (acme-v02.api.letsencrypt.org and acme-staging-v02.api.letsencrypt.org), as well as the production and staging portal environments hosted across two high-assurance datacenters.

By 21:03 UTC, roughly two and a half hours later, the organization confirmed that issuance had resumed. However, as a direct result of the cross-signed certificate issue, all certificate generation was rolled back to the Generation X root.

This rollback specifically impacts two ACME certificate profiles: tlsserver and shortlived.

The timing of the incident is notable given that Let’s Encrypt had already announced three significant platform changes scheduled to go live on May 13, 2026, just five days away. Those changes include:

The tlsserver ACME profile will begin issuing 45-day certificates as part of Let’s Encrypt’s phased roadmap to reduce certificate lifetimes from 90 days down to 45 days over the next two years.

The tlsclient profile, used for TLS client authentication certificates, will be restricted exclusively to ACME accounts that have previously requested certificates from that profile. Full support for tlsclient certificates will end on July 8, 2026.

The classic ACME profile was also scheduled to transition to Generation Y intermediates, which chain to the existing X1 and X2 roots a change designed to maintain broad compatibility across client environments.

All three changes are currently live in Let’s Encrypt’s staging environment and remain on track for the May 13 production rollout, pending resolution of the root certificate issue.

Let’s Encrypt has not disclosed details about whether any incorrectly issued certificates were distributed before issuance was halted.

Administrators relying on automated ACME-based renewal workflows, particularly those using the tlsserver or shortlived profiles should monitor renewal logs closely and verify that certificates issued around the May 8 window chain correctly to the expected root. Updates and community support remain available at community.letsencrypt.org.

Cybercriminals now enter through your suppliers instead of your front door – Free Webinar

The post Let’s Encrypt Halts Certificate Issuance After Cross-Signed Root Certificate Incident appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

New Jersey Distributes $5 Million in World Cup Grants as Hotel Bookings Fall Short of Expectations

Gov. Mikie Sherrill announced Wednesday that New Jersey will distribute $5 million in grants to…

3 minutes ago

Livingston Township Sets May 12 Deadline for Primary Election Voter Registration

The Livingston Township Clerk’s Office has announced Tuesday, May 12, as the final date to…

3 minutes ago

30 New Jersey Hospitals Earn Top Safety Grades in Leapfrog’s Spring 2026 Report

Thirty hospitals in New Jersey got “A” grades when the Leapfrog Group released its spring…

4 minutes ago

Montclair Approves Extra $500K for Snow Removal After Winter Costs Hit $1.3M

Montclair Township Council gave the green light Tuesday for another $500,000 to handle snow cleanup.…

4 minutes ago

WWE Announces Summer Tour, Returning to Atlantic City After Nearly Two Decades

WWE heads back to Atlantic City on June 29. It’s been almost 20 years since…

4 minutes ago

TCLBANKER Malware Targets Users Through Self-Propagating WhatsApp and Outlook Worm Modules

A highly sophisticated Brazilian banking trojan named TCLBANKER, tracked under the campaign REF3076, this malware…

13 minutes ago

This website uses cookies.